The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks 2011
DOI: 10.1145/2069105.2069115
|View full text |Cite
|
Sign up to set email alerts
|

A key management method based on an AVL tree and ECC cryptography for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Moreover, the results estimated how many messages we minimize during installation of the keys and how fast generating and storing of the ECC keys occur. In section 6, we also compared the result with the following implementations; specially RECC [12] and AVL-Headers/AVL-KDC [13]. The obtained results proved that the proposed algorithm can outperform other approaches based on the ECC.…”
Section: The Proposed Methodsmentioning
confidence: 87%
See 2 more Smart Citations
“…Moreover, the results estimated how many messages we minimize during installation of the keys and how fast generating and storing of the ECC keys occur. In section 6, we also compared the result with the following implementations; specially RECC [12] and AVL-Headers/AVL-KDC [13]. The obtained results proved that the proposed algorithm can outperform other approaches based on the ECC.…”
Section: The Proposed Methodsmentioning
confidence: 87%
“…They receive and then transmit nodes messages to the base station. The ECC keys generation and storage in the AVL tree are done by the base station while distribution is done either by a KDC server or by CH [13]. In AVL-KDC approach, when a node arrives or leaves the network, the KDC server starts updating public keys located throughout the node path to the base of the AVL tree and reconfigures the AVL tree.…”
Section: B-avl-headers and Avl-kdcmentioning
confidence: 99%
See 1 more Smart Citation
“…[21] Proposes an algorithm for indexing the keyword extracted from the web documents along with their context based on AVL tree. [22] Used them in Wireless sensor network to provide a security protocol. Also [23] has used this structure in data mining classification for a decision tree induction.…”
Section: Introductionmentioning
confidence: 99%
“…The next two papers deal with the design and use of efficient data structures for mobile P2P networks and WSN. H. Boumerzoug et al propose the use the AVL tree and elliptic curve cryptography to design an efficient lightweight key management scheme for WSN. Y. Feng et al further explore error‐resilient routing and load balancing strategies that can be employed in the hierarchically distributed tree, in order to better support multidimensional range queries in the mobile P2P overlay network.…”
mentioning
confidence: 99%